Skip to content

ngchianglin/ProtostarExercises

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Protostar Exploit Exercises Stack Smashing

Introduction

The repository contains C programs that demonstrates stack smashing using the exploit exercises protostar live cd. The exploit2.c is able to exploit stack0, stack3, stack4 and stack5 from the protostar exercises to gain root shell using a shellcode. exploit.c is able to do the same but is not automated.

There is a perl script for extracting machine instructions from objdump, a nasm shellcode and 2 other C programs.

The code here are provided and to be used for educational purpose only. To help IT professionals understand vulnerabilities better in order to better defend their systems. Computer misuse is a serious crime in Singapore and other countries, punishable by law.

Refer to the following for a detailed article on Buffer overflow and Stack smashing, using the protostar exercises.

https://www.nighthour.sg/articles/2017/explore-buffer-overflow-stack-smashing.html

The protostar live cd is available from

https://exploit-exercises.com/

Source signature

Gpg Signed commits are used for committing the source files.

Look at the repository commits tab for the verified label for each commit.

A userful link on how to verify gpg signature in https://github.com/blog/2144-gpg-signature-verification

About

Protostar Exploit Exercises

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published